期刊文献+

RISE: A RelIable and SEcure Scheme for Wireless Machine to Machine Communications 被引量:1

RISE: A RelIable and SEcure Scheme for Wireless Machine to Machine Communications
原文传递
导出
摘要 Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M's failure. This paper presents a Reliable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability of data (including sensor reports and actuator instructions) and devices (including sensors, actuators, and actors). The data reliability is improved by four algorithms, ChooseMedian, ChooseMost, ChooseNearest, and Trust-based Enhancement. Report attainability is improved via m repeat-sending and n multiple-reporting algorithms. Device reliability is guaranteed by device-indistinguishability, which comprises data-indistinguishability and behavior-indistinguishability. The security requirements are formally defined, and the security analysis proves the soundness and completeness of the scheme, Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M's failure. This paper presents a Reliable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability of data (including sensor reports and actuator instructions) and devices (including sensors, actuators, and actors). The data reliability is improved by four algorithms, ChooseMedian, ChooseMost, ChooseNearest, and Trust-based Enhancement. Report attainability is improved via m repeat-sending and n multiple-reporting algorithms. Device reliability is guaranteed by device-indistinguishability, which comprises data-indistinguishability and behavior-indistinguishability. The security requirements are formally defined, and the security analysis proves the soundness and completeness of the scheme,
出处 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第1期100-107,共8页 清华大学学报(自然科学版(英文版)
基金 supported by the National Natural Science Foundation of China(No.61170217) the Open Research Fund from the Shandong Provincial Key Laboratory of Computer Network(No.SDKLCN-2011-01) Fundamental Research Funds for the Central Universities,China University of Geosciences(Wuhan)(No.110109)
关键词 Machine to Machine (M2M) reliability security target distinguishing attack Machine to Machine (M2M) reliability security target distinguishing attack
  • 相关文献

参考文献11

  • 1A. Bartoli, M. Dohler, J. Serrano, A. Kountouris, and D. Barthel, Low-power low-rate goes long-range: The case for secure and cooperative machine-to-machine communications, Lecture Notes in Computer Science, vol. 61, no. 3, pp. 219-230, April 2011.
  • 2K. Chang, A. Soong, M. Tseng, and Z. Xiang, Global wireless machine-to-machine standardization, IEEE Internet Computing, vol. 15, no. 2, pp. 64-69, March-April 2011.
  • 3G. Lawton, Machine-to-machine technology gears up for growth, Computer, vol. 37, no. 9, pp. 12-15, September 2004.
  • 4C. Wietfeld, H. Georg, S. Groening, C. Lewandowski, C. Mueller, and J. Schmutzler, Wireless communicationnetworks for smart grid applications, in Proc. llth European Wireless Cm!ference 2011 - Sustainable Wireless Techmlogies (Europem Wireless). Vierma, Austria. Api:il 2011. pp. 1-7.
  • 5G. Wu S. Talwan K. Johnsson, N. Himayat, and K. Johnson. M2m: From mobile to embedded internet, IEEE Communications Magazine, vol. 49, no. 4, pp. 36-43, April 2011.
  • 6V. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao, and M. Guizani, Home m2m networks: Architectures, slandards, and qos impnvement. IEEE Commtt;zications Magazine, vol. 49, no. 4, pp. 44-52, April 201 I.
  • 7S. Alam, M. Chowdhury, and J. Noll, Interoperability of security-enabled internet of things, Wireless Persol+al Communications, vol. 61, no. 3, pp. 567-586, April 201 1.
  • 8A. Bartoli, J. Hernandez-Serrano, M. Soriano, M. Dohler, A. Kotmlouris, and D. Barthel, Securelossless aggregationover fading and shadowing channels for smart grid M2M networks, IEEE Transactions on Smart Grid, w[. 2, no. 4, pp. 844-864, December 201 1.
  • 9I. Cha, Y. Shah, A. Schmidl, A. Leicher, and M. Meyerstein, Trust in M2M communication, IEEE Vehicular Technology Magazine, vol. 4, no. 3, pp. 69-75, September 2009.
  • 10Z. Fadlullah, M. Fouda, N. Kato, X. Shen, and Y. Nozaki, An early warning system against malicious activities for smart grid communications. IEEE Network. v,l. 25. n.). 5. pp. 50-55, September-October 2011.

同被引文献12

  • 1J.PATAPJN. Security of Random Feistel Schemes with 5 or More Rounds[J]. Advances in Cryptol- ogy-CRYPTO, 2004, Voi.3252: 106-222.
  • 2J.PATARIN. A Proof of Security in O(2n) for the Bens Scheme[J]. Progress in AFRICACRYPT, 2008, Vol. 3152: 209-220.
  • 3J.BLACK. R ROGAWAY. Cipers with Arbitrary Finite Domains [J]. Topics in Cryptolgy-CT-RSA 2002, Vol.2272, Springer, 114-230, 2002.
  • 4MORRIS B, ROGAWAY P, STEGERS T. How to Encipher Messages on a Small Domain [J], Ad- vances in Cryptology -CRYPTO, 2009: 286-302.
  • 5L. GRANBOULAN L, R PORNIN T. Perfect Block Ciphers with Small Blocks [C]// Fast Software Encryption, 14th International Workshop. Lux- embourg City, Luxembourg, Springer, 2005: 39- 48Gentle J E. Random Number Generation and Monte Carlo Methods [J]. Springer, 2003.
  • 6STEFANOV E. SHI E. FastPRP" Fast Pseudo-Ran- dom Permutations for Small Domains[J]. IACR Crypto ogy ePr nt Arch ve, 2012, 254.
  • 7Gentle J E. Random number generation and Monte Carlo methods[M]. Springer, 2003,.
  • 8AVERIL M. LAW. Simulation Modeling Analysi [M]. McGraw Hill Higher Education(4t" revisec version),2006 |.
  • 9Hu Dongping, Cui Yongquan, Yin Aihua. An improved negative binomial approximation for negative hypergeometric distribution [J]. Ap- plied Mechanics and Materials, Vol. 427: 2549- 2553.
  • 10DIETER. U. Mathematical Aspects of Various Methods for Sampling from Classical Distribu- tions [C]// Proceedings of the 21st Conference on Winter Simulation, IEEE press, 1989: 477- 483.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部